Get Started
Loading Events
This event has passed.

This scenario demonstrates how a sophisticated attacker, using multiple methods of pivoting within the system, circumvents numerous security mechanisms allowing access to segments of the network that are otherwise unavailable. Participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment.

Share This Story, Choose Your Platform!

Go to Top